The eHash Main Page

From The ECRYPT Hash Function Website

(Difference between revisions)
Jump to: navigation, search
Line 11: Line 11:
[http://ehash.iaik.tugraz.at/index.php/HashFunctionZoo Hash Function Zoo]
[http://ehash.iaik.tugraz.at/index.php/HashFunctionZoo Hash Function Zoo]
 +
As a subset, here a list of submissions to the SHA-3 competition:
 +
[http://ehash.iaik.tugraz.at/index.php/The_SHA-3_Zoo SHA-3 Zoo]
= Generic Attacks on Hash Functions =
= Generic Attacks on Hash Functions =
Line 18: Line 20:
[http://ehash.iaik.tugraz.at/index.php/GenericAttacksMerkleDamgaard Generic Attacks on the Merkle-Damgaard Construction]
[http://ehash.iaik.tugraz.at/index.php/GenericAttacksMerkleDamgaard Generic Attacks on the Merkle-Damgaard Construction]
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<hr>
= Editors corner =
= Editors corner =

Revision as of 20:47, 1 November 2008

Contents

1 Introduction

An introduction to cryptographic hash functions.

Introduction

2 The Hash Function Zoo

On this page you can find a collection of existing hash functions.

Hash Function Zoo

As a subset, here a list of submissions to the SHA-3 competition: SHA-3 Zoo

3 Generic Attacks on Hash Functions

Generic Attacks on Hash Functions

Generic Attacks on the Merkle-Damgaard Construction









4 Editors corner

4.1 Some How Tos

Some hints how to work with math environments and bibtex

4.2 Getting started



ECRYPT is a Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at his or her sole risk and liability.


Personal tools